Gypseous soils are common in several regions in the world including Iraq, where more than 28.6% of its surface is covered with this type of soil. This soil, with high gypsum content, causes different problems for construction and strategic projects. As a result of water flow through the soil mass, the permeability and chemical arrangement of these soils varies with time due to the solubility and leaching of gypsum. In this study, the soil of 36% gypsum content, was taken from one location about 100 km southwest of Baghdad, where the samples were taken from depths (0.5 - 1) m below the natural ground and mixed with (3%, 6%, 9%) of Copolymer and Novolac polymer to improve the engineering properties that include: collapsibility, permeability and compaction parameter. Results of experimental work showed noticeable improvement of collapsibility and permeability for the soil treated with polymer materials compared to untreated soil. Adding 3% of polymer (copolymer and novolac polymer) materials gave the best improvement in collapsibility which reached to (44.5 and 46%), respectively, in 3 hours. The improvement in permeability reached to 98.6% copolymer and 86.2% novolac polymer in 1 day.
Simple, sensitive and economical spectrophotometric methods have been developed for the determination of cefixime in pure form. This method is based on the reaction of cefixime as n-electron donor with chloranil to give highly colored complex in ethanol which is absorb maximally at 550 nm. Beer's law is obeyed in the concentration ranges 5-250 µg ml-1 with high apparent molar absorptivities of 1.52×103 L.mole-1. cm-1.
This paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for propos
The eggshell cuticle is the proteinaceous outermost layer of the eggshell which regulates water exchange and protects against entry of micro-organisms. Outer eggshell and cuticle protein was extracted from domestic chicken. The aim of the research is to find out the effect of the treated and untreated nano particles of egg shells with micro wave cold plasma on the effectiveness of E. coli (negative bacteria) that infect the skin and measure the diameter of bacterial inhibition zone, the eggshell has been prepared by a chemical method (sol gel) and measure the level of acidity and the PH is neutral. The result of Atomic Force Microscope (AFM) shows that the particles diameters become smaller with nano-particles solution than for egg
... Show MoreBACKGROUND: Cochlear implant has become a routine procedure for management of severe sensorineural hearing loss. Cochlear implant extrusion is one of the most devastating complication of this procedure. A double layer closure of pericranial flap and scalp rotational flap has being showed to decrease the rate of late implant extrusion.OBJECTIVE:The purpose of this study is to evaluate the use of the pericranial flap as second layer coverage after cochlear implant extrusion.PATIENTS AND METHODS:Eight patients with cochlear implant extrusion in Al-Shaheed Gazi Al-Hariri hospital were operated on by using two layer closure ; the pericranial flap as salvage layer used to cover the cochlear implant and scalp rotational flap as a routine coverage,
... Show MoreData transmission in public communication system is not safe since of interception and improper manipulation by attacker. So, the attractive solution for these problems is to design high secure system that reduce the ability of attacker from getting sensitive information such as (account ID, passwords, etc.). The best way is combine two high secure techniques: steganography technique, which is the method of hiding any secret information like data, password and image behind any cover file and cryptography, which is convert the data to unreadable data. This paper suggests a crypto-stego authentication method to provide a highly secured authentication. The proposed method is utilized audio steganography and AES Cryp
... Show MoreWith the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us
... Show MoreMicroorganisms have an active role in biotechnology for example yeasts, especially in some genus like Saccharomyces, Pichia, and Candida. C.tropicalis one of the most important species of Candida and despite it is one of the causative agents of candidiasis but it has a major role in the production of many chemical compounds. C.tropicalis in the previous study was isolated from sheep dung and morphologically and molecularly classified the result of sequencing was elucidate 100% similarity between the studied isolate and other isolates inserted in DNA Data Bank of Japan DDBJ, physiologically this isolate tolerated 6% ethanol concentration in broth media with the ability to the pro
... Show MoreAbstract
The current study was carried out to reveal the plasma parameters such as ,the electron temperature ( ), electron density (ne) , plasma frequency (fp), Debye length ( ) , Debye number ( for CdS to employ the LIBS for the purpose of analyzing and determining spectral emission lines using . The results of electron temperature for CdS range (0.746-0.856) eV , the electron density(3.909-4.691)×1018 cm-3. Finally ,we discuss plasma parameters of CdS through nano second laser generated plasma .